0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (3)
  • R100 - R250 (276)
  • R250 - R500 (878)
  • R500+ (13,585)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking

Optical Networks - Design and Modelling / IFIP TC6 Second International Working Conference on Optical Network Design and... Optical Networks - Design and Modelling / IFIP TC6 Second International Working Conference on Optical Network Design and Modelling (ONDM'98) February 9-11, 1998 Rome, Italy (Hardcover, 1999 ed.)
Giancarlo De Marchis, Roberto Sabella
R2,678 Discovery Miles 26 780 Ships in 18 - 22 working days

Optical Network Design and Modelling is an essential issue for planning and operating networks for the next century. The main issues in optical networking are being widely investigated, not only for WDM networks but also for optical TDM and optical packet switching. This book contributes to further progress in optical network architectures, design, operation and management and covers the following topics in detail:
-- Routing strategies and algorithms for optical networks; -- Network planning and design; -- Wavelength conversion and wavelength assignment in optical networks; -- Technologies for optical networks (transport, access and local area networks); -- Transmission aspects in wide area optical networks; -- New paradigms for traffic modelling.

This book contains the selected proceedings of the Second International Working Conference on Optical Network Design and Modelling, which was sponsored by the International Federation for Information Processing (IFIP), and held in February 1998, in Rome, Italy.

This valuable new book will be essential reading for personnel in computer/communication industries, and for academic and research staff in computer science and electrical engineering.

AWS CloudTrail User Guide (Hardcover): Documentation Team AWS CloudTrail User Guide (Hardcover)
Documentation Team
R1,188 Discovery Miles 11 880 Ships in 18 - 22 working days
Internet Protocol-based Emergency Services (Hardcover): H Tschofenig Internet Protocol-based Emergency Services (Hardcover)
H Tschofenig
R2,350 Discovery Miles 23 500 Ships in 18 - 22 working days

Written by international experts in the field, this book covers the standards, architecture and deployment issues related to IP-based emergency services This book brings together contributions from experts on technical and operational aspects within the international standardisation and regulatory processes relating to routing and handling of IP-based emergency calls. Readers will learn how these standards work, how various standardization organizations contributed to them and about pilot projects, early deployment and current regulatory situation. Key Features: * Provides an overview of how the standards related to IP-based emergency services work, and how various organizations contributed to them * Focuses on SIP and IMS-based communication systems for the Internet * Covers standards, architecture and deployment issues * International focus, with coverage of the major national efforts in this area * Written by the experts who were/are involved in the development of the standards (NENA, EENA, 3GPP, IETF, ETSI, etc.) * Accompanying website provides updates on standards and deployment (http://ip-emergency.net) This book is an excellent resource for vendors building software and equipment for emergency services, engineers/researchers engaged in development of networks and network elements and standardization, emergency services providers, standardization experts, product persons, those within the regulatory environment. Students and lecturers, infrastructure and application service providers will also find this book of interest.

Multiaccess, Mobility and Teletraffic for Wireless Communications, volume 6 (Hardcover, 2002 ed.): Xavier Lagrange, Bijan... Multiaccess, Mobility and Teletraffic for Wireless Communications, volume 6 (Hardcover, 2002 ed.)
Xavier Lagrange, Bijan Jabbari
R4,206 Discovery Miles 42 060 Ships in 18 - 22 working days

Third generation networks have been specified and are now being deployed in a few countries. They are expected to reach maturity in the next several years and to provide various services including audio, video, and world wide web browsing. Furthermore, radio terminals are expected to be integrated in a number of devices such as personal computers, personal digital assistants, and even television sets. Such a wide-usage of radio mandates ongoing research to address design of networks with high capacity while providing acceptable quality of service. Included in Multiaccess, Mobility and Teletraffic for Wireless Communications: Volume 6 are new results on the optimization of protocols in third generation systems. The radio channel is dynamically shared among several users using packet access, it must adapt to a varying number of users and accomodate various services. Several chapters deal with radio resource management and packet access both in second and third generation systems. The book also considers the performance of low layer protocols (MAC/RLC) and transport protocols (e.g., TCP) when they are combined to offer data services. IPv6 will probably be an in-use network protocol in the near future. It must efficiently manage mobility and support multimedia flows. Wireless internet is an important area and related topics are included in this book. The improvement of the network performance relies on a sophisticated and optimized physical layer. The book includes studies on joint multiple access detection, MIMO systems, use of turbo-codes and methods to improve the analysis of the channel capacity. The book also covers location management, handoff optimization, multi-hop networks andnetwork management. Mobility and Teletraffic for Wireless Communications: Volume 6 is an important book for researchers, students and professionals working in the area of wireless communications and mobile computing.

IM Instant Messaging Security (Paperback): John Rittinghouse Phd Cism, James F. Ransome, PhD, CISM, CISSP IM Instant Messaging Security (Paperback)
John Rittinghouse Phd Cism, James F. Ransome, PhD, CISM, CISSP
R2,104 Discovery Miles 21 040 Ships in 10 - 15 working days

BRIEF DESCRIPTION OF CONTENT:
There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM issues in a manner that is useful for the day-to-day operations and management of enterprise networks. IM Security is intended to bridge this gap.

UNIQUE FEATURE/RATIONALE
There are no current books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security. No book we know of addresses IM security in a manner useful for day-to-day operations and management of IM-capable networks in today s corporate environment.
* Up-to-date coverage of architecture, design, theory, issues, challenges, and recommended policies for IM security.
* Addresses IM security for day-to-day operations and management of IM-capable networks in today s corporate environment"

SSH Mastery - OpenSSH, PuTTY, Tunnels and Keys (Hardcover, 2nd ed.): Michael W Lucas SSH Mastery - OpenSSH, PuTTY, Tunnels and Keys (Hardcover, 2nd ed.)
Michael W Lucas
R892 R810 Discovery Miles 8 100 Save R82 (9%) Ships in 18 - 22 working days
Cross-Media Service Delivery (Hardcover, 2003 ed.): Diomidis Spinellis Cross-Media Service Delivery (Hardcover, 2003 ed.)
Diomidis Spinellis
R4,141 Discovery Miles 41 410 Ships in 18 - 22 working days

Cross-Media Service Delivery is of interest to professionals and academicians working in content authoring and electronic publishing platforms; as well as in media and broadcasting.
The digitization of traditional media formats, such as text, images, video, and sound provides us with the ability to store, process, and transport content in a uniform way. This has led the formerly distinct industries of media, telecommunications, and information technology to converge. Cross-media publishing and service delivery are important new trends emerging in the content industry landscape. Mass-media organizations and content providers transitionally targeted content production towards a single delivery channel. However, recent economic and technological changes in the industry led content providers to extend their brands to cover multiple delivery channels. Following the content industry trend to "create once and publish everywhere" - COPE, a number of architectures, technologies, and tools are currently being developed and deployed to facilitate the automatic conversion of content to multiple formats, and the creation of innovative multi-platform services. This new approach enables the seamless access to information over different network infrastructures and client platforms.
This work uniquely brings together a cross-disciplinary core of contributors to address the technical and business issues of cross-media publishing and service delivery. The contributions are organized into four different areas: the business issues driving the requirements for cross media content delivery, the architectures used for delivering content to multiple platforms, technologies that address specificpractical problems, and, last but not least, concrete applications.

Discrete Password Logbook - Locked Door Edition (Hardcover): Suzeteo Enterprises Discrete Password Logbook - Locked Door Edition (Hardcover)
Suzeteo Enterprises
R503 Discovery Miles 5 030 Ships in 18 - 22 working days
Recent Advances in Face Recognition (Hardcover): Kresimir Delac, Mislav Grgic, Sonja Grgic Recent Advances in Face Recognition (Hardcover)
Kresimir Delac, Mislav Grgic, Sonja Grgic
R3,113 Discovery Miles 31 130 Ships in 18 - 22 working days
Managing Microsoft's Remote Installation Services (Paperback): Soren Rasmussen, Michael Iversen Managing Microsoft's Remote Installation Services (Paperback)
Soren Rasmussen, Michael Iversen
R2,386 Discovery Miles 23 860 Ships in 10 - 15 working days

BRIEF DESCRIPTION OF CONTENT:
The authors have been working with Remote Installation Services since its birth in 1999. We are really enthusiastic about working with it. From their experiences from very different customers with very different requirements to their Windows infrastructure environment, they have gained a tremendous deal of experience and in-depth knowledge with Remote Installation Services that other people can benefit from. This includes basic understanding, a lot of theory and best-practices, but also how you can stretch Remote Installation Services to really do what any system or network administrator would require. This information is essential for anyone wishing to implement Remote Installation Services and use the advanced features and tools it contains. There is much more than up grades, adding and deleting programs from a central administrator that can be done In addition it can save the cost adding a costly third party software package like Alteris to the enterprise network. This is the reason that the authors are now gathering all the experience and knowledge, and focusing on forming a single point of entry to everything you must know about Remote Installation Services in form of a book.
Note based on my (TRS) and reviewers comments the book will be over 320 pages as authors ad numerous consulting client examples and illustrations
UNIQUE FEATURE:
Book is excellent companion to Windows and Exchange series and WMI books by Lissoir: Authors are top quality IBM Consultants
.Gives Network and Systems Administrators real tools to manage up grades, program modifications and system and security related tools
.Presents a balance of theory and methods with best-practices the authors have developed in their consulting work
.Shows how an enterprise can save the cost adding a costly third party software package like Alteris to the enterprise network"

Preserving Privacy in Data Outsourcing (Hardcover, 2011 Ed.): Sara Foresti Preserving Privacy in Data Outsourcing (Hardcover, 2011 Ed.)
Sara Foresti
R2,754 Discovery Miles 27 540 Ships in 18 - 22 working days

Privacy requirements have an increasing impact on the realization of modern applications. Commercial and legal regulations demand that privacy guarantees be provided whenever sensitive information is stored, processed, or communicated to external parties. Current approaches encrypt sensitive data, thus reducing query execution efficiency and preventing selective information release.

Preserving Privacy in Data Outsourcing presents a comprehensive approach for protecting highly sensitive information when it is stored on systems that are not under the data owner's control. The approach illustrated combines access control and encryption, enforcing access control via structured encryption. This solution, coupled with efficient algorithms for key derivation and distribution, provides efficient and secure authorization management on outsourced data, allowing the data owner to outsource not only the data but the security policy itself. To reduce the amount of data to be encrypted the book also investigates data fragmentation as a possible way to protect privacy of data associations and provide fragmentation as a complementary means for protecting privacy: associations broken by fragmentation will be visible only to users authorized (by knowing the proper key) to join fragments. The book finally investigates the problem of executing queries over possible data distributed at different servers and which must be controlled to ensure sensitive information and sensitive associations be visible only to parties authorized for that. Case Studies are provided throughout the book.

Privacy, data mining, data protection, data outsourcing, electronic commerce, machine learning professionals and others working in these related fields will find this book a valuable asset, as well as primary associations such as ACM, IEEE and Management Science. This book is also suitable for advanced level students and researchers concentrating on computer science as a secondary text or reference book.

Broadband Infrastructure - The Ultimate Guide to Building and Delivering OSS/BSS (Hardcover, 2003 ed.): Shailendra Jain, Mark... Broadband Infrastructure - The Ultimate Guide to Building and Delivering OSS/BSS (Hardcover, 2003 ed.)
Shailendra Jain, Mark Hayward, Sharad Kumar
R4,170 Discovery Miles 41 700 Ships in 18 - 22 working days

The companies that provide the Internet to the rest of the world do not have the luxury of setting high expectations and assuming they will be met. These Internet infrastructure companies (IICs) are responsible for delivering the Internet's promise, including everything from eBusiness and mobile Internet applications to optical services and high-speed access. The Internet's audience takes this promise for granted, and IICs face the daunting challenge of making the Internet, and networks like it, do what the audience expects them to. To meet the expectations they face, IICs must harness the power of their operations support systems (OSSs) - the software systems in the background they use to create, manage, maintain, manipulate and adapt their networks to serve customers reliably and rapidly.
Broadband Infrastructure: The Ultimate Guide to Understanding and Delivering OSS/BSS is a "how to" book for Internet infrastructure companies to help them prepare for the decisions they will face when constructing their core OSS strategies and infrastructure. This book provides a source of reference and education to learn the language, methods, and technologies associated with the OSS market. It examines the Internet infrastructure supply chain and how it will be automated. Finally, it brings together a wealth of proven knowledge and advice, gathered from BusinessEdge Solutions' extensive OSS experience, that broadband providers can use to minimize their OSS risks while maximizing their ability to differentiate and compete.

The Student Supercomputer Challenge Guide - From Supercomputing Competition to the Next HPC Generation (Hardcover, 1st ed.... The Student Supercomputer Challenge Guide - From Supercomputing Competition to the Next HPC Generation (Hardcover, 1st ed. 2018)
Asc Community
R1,733 Discovery Miles 17 330 Ships in 10 - 15 working days

This guide provides a comprehensive overview of High Performance Computing (HPC) to equip students with a full skill set including cluster setup, network selection, and a background of supercomputing competitions. It covers the system, architecture, evaluating approaches, and other practical supercomputing techniques. As the world's largest supercomputing hackathon, the ASC Student Supercomputer Challenge has attracted a growing number of new talent to supercomputing and has greatly promoted communications in the global HPC community. Enclosed in this book, readers will also find how to analyze and optimize supercomputing systems and applications in real science and engineering cases.

Memory Machines - The Evolution of Hypertext (Paperback): Belinda Barnet Memory Machines - The Evolution of Hypertext (Paperback)
Belinda Barnet
R769 Discovery Miles 7 690 Ships in 10 - 15 working days
Achieving Full Realization and Mitigating the Challenges of the Internet of Things (Hardcover): Marcel Ohanga Odhiambo, Weston... Achieving Full Realization and Mitigating the Challenges of the Internet of Things (Hardcover)
Marcel Ohanga Odhiambo, Weston Mwashita
R5,948 Discovery Miles 59 480 Ships in 18 - 22 working days

As the IoT market is booming, several issues are delaying the full realization of the technology. IoT devices, in cybersecurity terms, greatly increase security risk. This means that any scientific work that offers cybersecurity strategies will excite security experts who will be glad to expand their knowledge base on IoT cybersecurity. As a result of the booming of the IoT market, business competitors are jockeying for a piece of the market. This means that solutions from researchers that address compatibility issues will be greatly welcomed by IoT technology developers. Connectivity providers are likely to embrace solutions to challenges of bandwidth since a growing IoT market must be followed up by bandwidth-intensive IoT applications which tend to jostle for space on the current client-server model. Overpromising followed by underdelivering, has been the current approach by many innovators and the mismatch results in losses in production, orphaned technologies accompanied by frequent system failures. Solutions that address IoT performance issues are likely to excite many start-ups. Solutions to challenges of fragmentation presented by thousands of devices from different manufacturers operating on proprietary ecosystems are likely to be warmly embraced by many IoT brands developers. As such, a publication that specifically addresses the challenges faced in the rolling out of IoT technologies is sorely needed.

Challenges in Ad Hoc Networking - Fourth Annual Mediterranean Ad Hoc Networking Workshop, June 21-24, 2005, Ile de... Challenges in Ad Hoc Networking - Fourth Annual Mediterranean Ad Hoc Networking Workshop, June 21-24, 2005, Ile de Porquerolles, France (Hardcover, 2006 ed.)
K. Al Agha, I. Guerin Lassous, G. Pujolle
R2,717 Discovery Miles 27 170 Ships in 18 - 22 working days

This book contains the refereed proceedings of the Fourth Annual Mediterranean Ad Hoc Networking Workshop, Med-Hoc-Net 2005. Med-Hoc-Net 2005 consolidated the success of the previous editions of the workshop series. It aimed to serve as a platform for researchers from academia, research, laboratories, and industry from all over the world to share their ideas, views, reults, and experiences in the field of ad-hoc networking.

Internet Naming and Discovery - Architecture and Economics (Hardcover, 2013 ed.): Joud S. Khoury, Chaouki T. Abdallah Internet Naming and Discovery - Architecture and Economics (Hardcover, 2013 ed.)
Joud S. Khoury, Chaouki T. Abdallah
R3,267 Discovery Miles 32 670 Ships in 10 - 15 working days

Naming is an integral building block within data networks and systems and is becoming ever more important as complex data-centric usage models emerge. Internet Naming and Discovery is timely in developing a unified model for studying the topic of naming and discovery. It details the architectural and economic tools needed for designing naming and discovery schemes within the broader context of internetwork architecture. Readers will find in this book a historic overview of the Internet and a comprehensive survey of the literature, followed by and an in-depth examination of naming and discovery. Specific topics covered include: * formal definitions of name, address, identifier, locator, binding, routing, discovery, mapping, and resolution; * a discussion of the properties of names and bindings, along with illustrative case studies; * taxonomy that helps in organizing the solution space, and more importantly in identifying new avenues for contributing to the field; * a general model for exploring the tradeoffs involved in designing discovery systems; * an illustrative design exercise for differentiated discovery services; * broad treatment of the main economic issues that arise in the context of discovery; and * a game-theoretic incentive model for route distribution (and discovery) in the context of path-vector routing protocols (mainly BGP). Internet Naming and Discovery will be of great value to readers, including graduate students, engineers and computer scientists, theoreticians and practitioners, seeking a training in advanced networking, or specializing in computer and communications networks.

Localized Quality of Service Routing for the Internet (Hardcover, 2003 ed.): Srihari Nelakuditi, Zhi-Li Zhang Localized Quality of Service Routing for the Internet (Hardcover, 2003 ed.)
Srihari Nelakuditi, Zhi-Li Zhang
R1,470 Discovery Miles 14 700 Ships in 18 - 22 working days

Under Quality of Service (QoS) routing, paths for flows are selected based upon the knowledge of resource availability at network nodes and the QoS requirements of flows. QoS routing schemes proposed differ in the way they gather information about the network state and select paths based on this information. We broadly categorize these schemes into best-path routing and proportional routing. The best-path routing schemes gather global network state information and always select the best path for an incoming flow based on this global view. On the other hand, proportional routing schemes proportion incoming flows among a set of candidate paths. We have shown that it is possible to compute near-optimal proportions using only locally collected information. Furthermore, a few good candidate paths can be selected using infrequently exchanged global information and thus with minimal communication overhead.

Localized Quality Of Service Routing For The Internet, describes these schemes in detail demonstrating that proportional routing schemes can achieve higher throughput with lower overhead than best-path routing schemes. It first addresses the issue of finding near-optimal proportions for a given set of candidate paths based on locally collected flow statistics. This book will also look into the selection of a few good candidate paths based on infrequently exchanged global information. The final phase of this book will describe extensions to proportional routing approach to provide hierarchical routing across multiple areas in a large network.

Localized Quality Of Service Routing For The Internet is designed for researchers and practitioners in industry, and is suitable for graduatelevel students in computer science as a secondary text.

Quantum Communication, Quantum Networks, and Quantum Sensing (Paperback): Ivan B. Djordjevic Quantum Communication, Quantum Networks, and Quantum Sensing (Paperback)
Ivan B. Djordjevic
R2,958 Discovery Miles 29 580 Ships in 10 - 15 working days

Quantum Communication, Quantum Networks, and Quantum Sensing represents a self-contained introduction to quantum communication, quantum error-correction, quantum networks, and quantum sensing. It starts with basic concepts from classical detection theory, information theory, and channel coding fundamentals before continuing with basic principles of quantum mechanics including state vectors, operators, density operators, measurements, and dynamics of a quantum system. It continues with fundamental principles of quantum information processing, basic quantum gates, no-cloning and theorem on indistinguishability of arbitrary quantum states. The book then focuses on quantum information theory, quantum detection and Gaussian quantum information theories, and quantum key distribution (QKD). The book then covers quantum error correction codes (QECCs) before introducing quantum networks. The book concludes with quantum sensing and quantum radars, quantum machine learning and fault-tolerant quantum error correction concepts.

Piecewise Linear Modeling and Analysis (Hardcover, 1998 ed.): Domine Leenaerts, Wim M.G.Van Bokhoven Piecewise Linear Modeling and Analysis (Hardcover, 1998 ed.)
Domine Leenaerts, Wim M.G.Van Bokhoven
R4,119 Discovery Miles 41 190 Ships in 18 - 22 working days

Piecewise Linear (PL) approximation of non-linear behaviour is a well-known technique in synthesis and analysis of electrical networks. However, the PL description should be efficient in data storage and the description should allow simple retrieval of the stored information. Furthermore, it would be useful if the model description could handle a large class of piecewise linear mappings. Piecewise Linear Modeling and Analysis explains in detail all possible model descriptions for efficiently storing piecewise linear functions, starting with the Chua descriptions. Detailed explanation on how the model parameter can be obtained for a given mapping is provided and demonstrated by examples. The models are ranked to compare them and to show which model can handle the largest class of PL mappings. All model descriptions are implicitly related to the Linear Complementarity Problem and most solution techniques for this problem, like Katzenelson and Lemke, are discussed according to examples that are explained in detail. To analyse PL electrical networks a simulator is mandatory. Piecewise Linear Modeling and Analysis provides a detailed outline of a possible PL simulator, including pseudo-programming code. Several simulation domains like transient, AC and distortion are discussed. The book explains the attractive features of PL simulators with respect to mixed-level and mixed-signal simulation while paying due regard also to hierarchical simulation. Piecewise Linear Modeling and Analysis shows in detail how many existing components in electrical networks can be modeled. These range from digital logic and analog basic elements such as transistors to complex systems like Phase-Locked Loops and detection systems. Simulation results are also provided. The book concludes with a discussion on how to find multiple solutions for PL functions or networks. Again, the most common techniques are outlined using clear examples. Piecewise Linear Modeling and Analysis is an indispensable guide for researchers and designers interested in network theory, network synthesis and network analysis.

Spoken Multimodal Human-Computer Dialogue in Mobile Environments (Hardcover, 2005 ed.): Wolfgang Minker, Dirk Buhler, Laila... Spoken Multimodal Human-Computer Dialogue in Mobile Environments (Hardcover, 2005 ed.)
Wolfgang Minker, Dirk Buhler, Laila Dybkjaer
R4,243 Discovery Miles 42 430 Ships in 18 - 22 working days

The ongoing migration of computing and information access from stationary environments to mobile computing devices for eventual use in mobile environments, such as Personal Digital Assistants (PDAs), tablet PCs, next generation mobile phones, and in-car driver assistance systems, poses critical challenges for natural human-computer interaction. Spoken dialogue is a key factor in ensuring natural and user-friendly interaction with such devices which are meant not only for computer specialists, but also for everyday users.

Speech supports hands-free and eyes-free operation, and becomes a key alternative interaction mode in mobile environments, e.g. in cars where driver distraction by manually operated devices may be a significant problem. On the other hand, the use of mobile devices in public places, may make the possibility of using alternative modalities possibly in combination with speech, such as graphics output and gesture input, preferable due to e.g. privacy issues. Researchers' interest is progressively turning to the integration of speech with other modalities such as gesture input and graphics output, partly to accommodate more efficient interaction and partly to accommodate different user preferences.

This book:
-combines overview chapters of key areas in spoken multimodal dialogue (systems and components, architectures, and evaluation) with chapters focussed on particular applications or problems in the field;
-focuses on the influence of the environment when building and evaluating an application.

Audience: Computer scientists, engineers, and others who work in the area of spoken multimodal dialogue systems in academia and in the industry;
graduatestudents and Ph.D. students specialising in spoken multimodal dialogue systems in general, or focusing on issues in these systems in mobile environments in particular.

Computer Network Security (Hardcover, 2005 ed.): Joseph Migga Kizza Computer Network Security (Hardcover, 2005 ed.)
Joseph Migga Kizza
R1,686 Discovery Miles 16 860 Ships in 10 - 15 working days

A comprehensive survey of computer network security concepts, methods, and practices. This authoritative volume provides an optimal description of the principles and applications of computer network security in particular, and cyberspace security in general. The book is thematically divided into three segments: Part I describes the operation and security conditions surrounding computer networks; Part II builds from there and exposes readers to the prevailing security situation based on a constant security threat; and Part III - the core - presents readers with most of the best practices and solutions currently in use. It is intended as both a teaching tool and reference. This broad-ranging text/reference comprehensively surveys computer network security concepts, methods, and practices and covers network security tools, policies, and administrative goals in an integrated manner. It is an essential security resource for undergraduate or graduate study, practitioners in networks, and professionals who develop and maintain secure computer network systems.

Cyber Crime and the Victimization of Women - Laws, Rights and Regulations (Hardcover, New): Debarati Halder, K Jaishankar Cyber Crime and the Victimization of Women - Laws, Rights and Regulations (Hardcover, New)
Debarati Halder, K Jaishankar
R4,911 Discovery Miles 49 110 Ships in 18 - 22 working days

While women benefit from using new digital and Internet technologies for self-expression, networking, and professional activities, cyber victimization remains an underexplored barrier to their participation. Women often outnumber men in surveys on cyber victimization. Cyber Crime and the Victimization of Women: Laws, Rights and Regulations is a unique and important contribution to the literature on cyber crime. It explores gendered dimensions of cyber crimes like adult bullying, cyber stalking, hacking, defamation, morphed pornographic images, and electronic blackmailing. These and other tactics designed to inflict intimidation, control, and other harms are frequently committed by perpetrators who, for many reasons, are unlikely to be identified or punished. Scholars, researchers, law makers, and ordinary women and their supporters will gain a better understanding of cyber victimization and discover how to improve responses to cyber crimes against women.

Research Anthology on Artificial Intelligence Applications in Security, VOL 2 (Hardcover): Information Reso Management... Research Anthology on Artificial Intelligence Applications in Security, VOL 2 (Hardcover)
Information Reso Management Association
R9,815 Discovery Miles 98 150 Ships in 18 - 22 working days
PC Interfacing (Paperback, 3rd ed.): Pei An PC Interfacing (Paperback, 3rd ed.)
Pei An
R1,213 Discovery Miles 12 130 Ships in 10 - 15 working days

The main links with your PC and the outside world are the centronic port, used for connecting the printer, the RS232 port, used for the mouse, and the games port for a joystick. This book explores how these input/output (I/O) ports can be put to use through a range of other interfacing applications. This is especially useful for laptop and palmtop PCs which cannot be fitted with internal I/O cards. A novel approach is taken by this book, combining the hardware through which the ports can be explored, and the software programming needed to carry out a range of experiments.
Circuits are provided for simple testing tools, and three experimental boards - which can also be purchased ready-made. Ready-to-run TurboPascal programs are available on the Newnes web site.
A huge range of applications are considered, turning the PC into a flexible core of a variety of systems. External devices considered include opto-isolator drivers, power drivers, LED drivers, relay drivers, special driver ICs, and methods of driving opto-isolated zero-crossing solid state relays, stepper motors, sound generating devices and displays. Ways of gathering information from the outside world are given, as well as connection to digital devices, remote control and digital communication.
As well as teaching in this field, Pei An has written numerous articles for magazines such as Electronics World and Electronics Today International.

A hands-on guide to exploring your PC's input/output ports
Covers the hardware and software aspects of interfacing
An exciting project-based approach to an important subject area

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Mastering Your Introduction to Cyber…
Michael C Redmond Hardcover R604 Discovery Miles 6 040
Red-Foot Tortoise - A Red-Foot Tortoise…
Lolly Brown Paperback R352 Discovery Miles 3 520
Bearded Dragon - Pet Expert
Lance Jepson Paperback R382 Discovery Miles 3 820
Ransomware
Allan Liska, Timothy Gallo Paperback R867 R746 Discovery Miles 7 460
Pillbugs and Other Isopods - Cultivating…
Orin McMonigle Hardcover R1,441 Discovery Miles 14 410
Grandad's Secret Password Book - Protect…
Dubreck World Publishing Paperback R348 Discovery Miles 3 480
Cybersecurity - Learn Information…
Alan Grid Hardcover R706 R625 Discovery Miles 6 250
Combating Security Breaches and Criminal…
S Geetha, Asnath Victy Phamila Hardcover R5,171 Discovery Miles 51 710
Dad's Secret Password Book - Protect…
Dubreck World Publishing Paperback R348 Discovery Miles 3 480
Curious about Snakes
Alissa Thielges Paperback R236 R216 Discovery Miles 2 160

 

Partners